mainframe event monitoring

Hi everyone, You don’t have to be a CIO to know that cybersecurity is one of the biggest challenges facing both public and private enterprises today. It was even mentioned as an issue in the recent presidential debates. Yet you probably work with someone who still hasn’t received the memo. You know who I’m talking…

Bob Fake, CEO, InfoSec The mainframe is just like any other part of an IT infrastructure in that it needs to be protected from security breaches. Nothing is exempt, and nothing should be left vulnerable so that it may be compromised. However, when it comes to security, mainframes are often treated differently from the rest…

Hi everyone, Imagine you just moved into a new house in what you thought was a safe, quiet suburb. When your next-door neighbor extends a hand over your shared fence to introduce himself, you notice the home security sign on his lawn. You ask, “What’s the history of break-ins in this neighborhood?” He answers matter-of-factly,…

In today’s IT security infrastructure, there are usually two separate security monitoring systems: one for the mainframes, one for the open system. These two groups are essentially performing the same function—which is to monitor security and prevent cyber threats from taking place—and they generally don’t communicate as often as they should. Event management encompasses the…

Hi everyone, If your organization relies on a mainframe that means that, on average, about 70 percent of your mission-critical data is likely housed there. With Big Iron taking on external applications, the Internet of Things (IoT) and the demands of your Big Data strategies, it’s clear that the mainframe is your MVP for day-to-day…

Enterprises like healthcare companies, financial services and government agencies rely heavily on the mainframe to protect their most sensitive data. Although open systems are more vulnerable to attacks, the mainframe is not immune. In fact, knowing the valuable data that is stored on the mainframe can make it a more attractive challenge for hackers. The…